On 5 Jan 2016, at 2:58, Valery Smyslov wrote:

Hi Paul,
thank you for your comments.

This draft makes me nervous, as compression has been removed from
encryption specifications in the last few years.

As far as I know IPcomp isn't deprecated, is it?

No, but that's not what PaulW said.

If you mean TLS, then as far as I understand the compression-related attacks on TLS rely on an ability for an attacker to insert specific data into the
encrypted (and compressed) stream that contains secret information
(e.g. password). I don't think it's relevant to IKE and it is discussed
in the Security Considerations section.

No one considered it relevant to TLS until researchers discovered the problems there. I think that's PaulW's point, and one that I agree with.


I find the security
considerations also weak on this. It basically says "if you think
compression might be security issue, don't use it". Which isn't helpful
at all to implementors.

Not really. It says that basically using compression in IKE should be safe. However, IF you transfer secret information inside an IKE SA and IF some part of the IKE messages originates outside IKE, then you are probably at risk. This could happen in case of EAP authentication using weak EAP methods that transfer passwords in clear. Note, that RFC 7296 strongly discourage
using such methods.

Note, that this is -00 draft and the security considerations
are currently very basic. What do you think should be added there?

That seems like a premature question. We haven't even decided if the idea of compressing IKE would give the benefits listed, whether the computational cost match the space benefits, and thus should be considered at all.

--Paul Hoffman

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to